作者: 引起 時(shí)間: 2025-3-21 23:46 作者: 狂亂 時(shí)間: 2025-3-22 03:42
Biometric Face Authentication Using Pixel-Based Weak Classifiersscale face image into a Linear Discriminant subspace as input of a classifier such as Support Vector Machines or Multi-layer Perceptrons. Unfortunately, these classifiers involve thousands of parameters that are difficult to store on a smart-card for instance. Recently, boosting algorithms has emerg作者: coddle 時(shí)間: 2025-3-22 06:26
Null Space Approach of Fisher Discriminant Analysis for Face Recognitionll space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysis, we present the NLDA algorithm and the most suitable situation for NLDA. Our method is simpler than all other null space appr作者: 注意 時(shí)間: 2025-3-22 11:35 作者: 翅膀拍動(dòng) 時(shí)間: 2025-3-22 15:44
Towards a Robust Face Detectorith image-based analysis, in order to better exploit the main characteristics available in the input image. Different modules contribute to the face detection task: 1) a template-based approach initially proposed in [12], 2) an edge-extraction technique well suited to deal with illumination-changes,作者: Neuralgia 時(shí)間: 2025-3-22 18:26 作者: A簡(jiǎn)潔的 時(shí)間: 2025-3-22 22:04 作者: reject 時(shí)間: 2025-3-23 03:07
Benchmarking of Fingerprint Sensorshodology is available. This paper attempts to address this deficiency by proposing a new methodology to benchmark the fingerprint sensors. The methodology consists of three metrics and the associated procedures to collect the data in order to compute the proposed metrics. Two small scale experiments作者: 魅力 時(shí)間: 2025-3-23 06:42
Detecting Liveness in Fingerprint Scanners Using Wavelets: Results of the Test Datasetve people, is used as a measure to classify ‘live’ fingers from ‘not live’ fingers. Pre-processing involves filtering of the images using different image processing techniques. Wavelet analysis of the images is performed using Daubechies wavelet. Multiresolution analysis is performed to extract info作者: GROWL 時(shí)間: 2025-3-23 10:36
Fingerprint Distortion Measurementto scale represented images. Therefore, image data from so-called sweep sensors is reconstructed to obtain conventional images. Measuring the deformation of fingerprint images facilitates other matching approaches not requiring the finger speed information, e.g. using directly concatenated slice ima作者: Physiatrist 時(shí)間: 2025-3-23 17:52
Study of the Distinctiveness of Level 2 and Level 3 Features in Fragmentary Fingerprint Comparisonts fragment. Level 2 and Level 3 features are considered, and their distinctive potential is estimated in respect to the considered area of a fingerprint fragment. We conclude that the use of level 3 features can offer at least a comparable recognition potential from a small area fingerprint fragmen作者: TEM 時(shí)間: 2025-3-23 21:14
Biometric Sensor Interoperability: A Case Study in Fingerprints that the data (viz., images) to be compared are obtained using the same sensor and, hence, are restricted in their ability to match or compare biometric data originating from different sensors. Although progress has been made in the development of common data exchange formats to facilitate the exch作者: 多產(chǎn)子 時(shí)間: 2025-3-23 23:16 作者: SOW 時(shí)間: 2025-3-24 04:43
Capacity and Examples of Template-Protecting Biometric Authentication Systemsd for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves C. as well as C. (the identification capacity). Finally, we present some practical constructions of the general algorithm and analyze their properties.作者: 范圍廣 時(shí)間: 2025-3-24 08:13 作者: Ganglion-Cyst 時(shí)間: 2025-3-24 13:37
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification veral methods for creating approximate confidence intervals for matching error rates. Testing of biometric identification devices is recognized as inducing intra-individual correlation. In order to estimate error rates associated with these devices, it is necessary to deal with these correlations. I作者: extract 時(shí)間: 2025-3-24 18:33
Architectures for Biometric Match-on-Token Solutionshe high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens th作者: 嫻熟 時(shí)間: 2025-3-24 22:12 作者: 責(zé)任 時(shí)間: 2025-3-25 03:09
Davide Maltoni,Anil K. JainIncludes supplementary material: 作者: Munificent 時(shí)間: 2025-3-25 07:01
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/188163.jpg作者: RLS898 時(shí)間: 2025-3-25 07:51 作者: 6Applepolish 時(shí)間: 2025-3-25 13:58
0302-9743 Overview: Includes supplementary material: 978-3-540-22499-0978-3-540-25976-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 禍害隱伏 時(shí)間: 2025-3-25 17:24
Ethik der langfristigen Planung,d for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves C. as well as C. (the identification capacity). Finally, we present some practical constructions of the general algorithm and analyze their properties.作者: cancellous-bone 時(shí)間: 2025-3-25 22:40
Effekte technologischer Angebotsschocksing salient feature regions corresponding to eyes, eye brows, nose and lips. However, ICA basis images do not display perfectly local characteristic in the sense that pixels that do not belong to locally salient feature regions still have some weight values. These pixels in the non-salient regions c作者: 自戀 時(shí)間: 2025-3-26 03:19 作者: Mitigate 時(shí)間: 2025-3-26 05:36
Konzept des Obliged Consumptionscale face image into a Linear Discriminant subspace as input of a classifier such as Support Vector Machines or Multi-layer Perceptrons. Unfortunately, these classifiers involve thousands of parameters that are difficult to store on a smart-card for instance. Recently, boosting algorithms has emerg作者: myopia 時(shí)間: 2025-3-26 09:02
Konzept des Obliged Consumptionll space-based LDA takes full advantage of the null space while the other methods remove the null space. It proves to be optimal in performance. From the theoretical analysis, we present the NLDA algorithm and the most suitable situation for NLDA. Our method is simpler than all other null space appr作者: hereditary 時(shí)間: 2025-3-26 14:30 作者: Innovative 時(shí)間: 2025-3-26 17:05 作者: Irksome 時(shí)間: 2025-3-27 00:32
https://doi.org/10.1007/978-3-663-02659-4ssumed for a false acceptance and false rejection. This rate between costs can be intuitively known by the system responsible and are a starting point to fulfil user security requirements. With this user-friendly data, an algorithm based on screening techniques to compute the acceptance threshold is作者: Anonymous 時(shí)間: 2025-3-27 01:24 作者: 反叛者 時(shí)間: 2025-3-27 07:16
https://doi.org/10.1007/978-3-663-20493-0hodology is available. This paper attempts to address this deficiency by proposing a new methodology to benchmark the fingerprint sensors. The methodology consists of three metrics and the associated procedures to collect the data in order to compute the proposed metrics. Two small scale experiments作者: 激怒某人 時(shí)間: 2025-3-27 10:15 作者: DEAWL 時(shí)間: 2025-3-27 13:54
https://doi.org/10.1007/978-3-663-04894-7to scale represented images. Therefore, image data from so-called sweep sensors is reconstructed to obtain conventional images. Measuring the deformation of fingerprint images facilitates other matching approaches not requiring the finger speed information, e.g. using directly concatenated slice ima作者: 發(fā)酵 時(shí)間: 2025-3-27 21:36
https://doi.org/10.1007/978-3-663-04894-7ts fragment. Level 2 and Level 3 features are considered, and their distinctive potential is estimated in respect to the considered area of a fingerprint fragment. We conclude that the use of level 3 features can offer at least a comparable recognition potential from a small area fingerprint fragmen作者: 幻影 時(shí)間: 2025-3-27 22:11
Ethics of Science and Technology Assessment that the data (viz., images) to be compared are obtained using the same sensor and, hence, are restricted in their ability to match or compare biometric data originating from different sensors. Although progress has been made in the development of common data exchange formats to facilitate the exch作者: 匯總 時(shí)間: 2025-3-28 03:45
https://doi.org/10.1007/978-3-642-42004-7bile embedded devices in which floating-point processing units (FPU) are absent. Earlier Hong and Jain reported a fingerprint enhancement algorithm based on the Gabor Filter. This algorithm and its derivatives have been proved to be quite effective in improving the fingerprint verification reliabili作者: THE 時(shí)間: 2025-3-28 09:56 作者: 摻假 時(shí)間: 2025-3-28 13:16 作者: NAVEN 時(shí)間: 2025-3-28 15:43 作者: 潛伏期 時(shí)間: 2025-3-28 22:28
https://doi.org/10.1057/9780230608764he high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens th作者: LATER 時(shí)間: 2025-3-28 23:47
https://doi.org/10.1057/9780230608764to hide challenge responses in a WSQ-compressed fingerprint image. In this paper, we extend the work to analyze the security holes in the data hiding method and enhance the hiding technique to thwart attacks on the system. We employ several proven IT security techniques to provide a secure method of作者: PAGAN 時(shí)間: 2025-3-29 06:20
https://doi.org/10.1007/b99174access control; architecture; bioinformatics; biometric authentication; biometric systems; biometrics; fin作者: 緯度 時(shí)間: 2025-3-29 11:16 作者: 緯線 時(shí)間: 2025-3-29 12:32 作者: GENRE 時(shí)間: 2025-3-29 18:54
Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonicsm robust pose and illumination invariant face recognition by using the recovered 3D faces. During training, given an image under arbitrary illumination, we first compute the shape parameters from a shape error estimated by the displacements of a set of feature points. Then we estimate the illuminati作者: Culpable 時(shí)間: 2025-3-29 20:31 作者: 雪上輕舟飛過(guò) 時(shí)間: 2025-3-30 00:34 作者: coddle 時(shí)間: 2025-3-30 05:42 作者: magenta 時(shí)間: 2025-3-30 12:12
https://doi.org/10.1007/978-3-658-09766-0m robust pose and illumination invariant face recognition by using the recovered 3D faces. During training, given an image under arbitrary illumination, we first compute the shape parameters from a shape error estimated by the displacements of a set of feature points. Then we estimate the illuminati作者: Arable 時(shí)間: 2025-3-30 15:20
Konzept des Obliged Consumptionnly requires one eigen-value analysis and is also applicable to the large sample size problem. Experiments are carried out on different face data sets to demonstrate the effectiveness of the proposed methods.作者: amyloid 時(shí)間: 2025-3-30 16:41 作者: 燈泡 時(shí)間: 2025-3-30 23:33 作者: 噴油井 時(shí)間: 2025-3-31 01:46
https://doi.org/10.1007/978-3-663-02659-4correspondences of minutiae that may be caused by various noise and distortion factors. Relatively compact and theoretically grounded model of the deformations is proposed, which allows to obtain the estimations of discrepancies in the most extreme cases.作者: 易改變 時(shí)間: 2025-3-31 08:17 作者: 帶傷害 時(shí)間: 2025-3-31 12:05
https://doi.org/10.1007/978-3-663-02659-4two classifiers (neural network radial basis function and support vector machine). Experimental results with a 100 people face database are shown. This method can be also applied into other biometric applications in which this threshold should be calculated.作者: minimal 時(shí)間: 2025-3-31 15:07
https://doi.org/10.1007/978-3-663-20493-0ensors with different skin type and under different weather condition. The effect of number of usage with acquisition performance is also analyzed. Analysis of the results shows that the proposed method does provide a basic sensor benchmarking capability.作者: lymphedema 時(shí)間: 2025-3-31 20:33
https://doi.org/10.1057/9780230608764minal. To achieve this, a general architecture, based on a set of requirements previously defined, will be outlined. At the end, directives for the implementation of such an architecture using smartcards and USB-Tokens will be given.作者: aspersion 時(shí)間: 2025-3-31 23:48
Towards a Robust Face Detectorerns that further improves the face/non-face discrimination. The experimental results show that the system can localize faces in images with complex background, even in presence of strong illumination changes.作者: calumniate 時(shí)間: 2025-4-1 04:59
Automatic Detection of the Optimal Acceptance Threshold in a Face Verification Systemtwo classifiers (neural network radial basis function and support vector machine). Experimental results with a 100 people face database are shown. This method can be also applied into other biometric applications in which this threshold should be calculated.